Which two Identity Awareness commands are used to support identity sharing?
Correct Answer:
A
Log query results can be exported to what file format?
Correct Answer:
B
Which Threat Prevention profile uses sanitization technology?
Correct Answer:
B
Strict Security for Perimeter Profile & Perimeter Profile use sanitization as a technology in Threat prevention profile
Which of the following is NOT a tracking log option in R80.x?
Correct Answer:
C
To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
Correct Answer:
B
Data from malicious attacks are shared between the Threat Prevention Software Blades and help to keep your network safe. For example, the signatures from threats that Threat Emulation identifies are added to the ThreatCloud for use by the other Threat Prevention blades. src
https://infosec.co.il/wp-content/uploads/2020/06/12-GAiA-R80.40-Threat-Prevention.pdf page 28.